top of page

WMI: Detection, Defense, and Hunting

Pages Count

6 Pages

Links for the courses

A Dive in its Capabilities and Stealthy Persistence Techniques: Click me  

Detecting WMI-Based Attacks:  Click me 

Understanding Event Consumers:  Click Me

The Intricacies of MOF Files : Click Me

#PRAGMA AUTORECOVER : Click me 

Hunting Malicious WMI Activity : Click Me

Your Instructor

Dean

Dean
bottom of page